{"id":2341,"date":"2023-12-11T08:08:14","date_gmt":"2023-12-11T08:08:14","guid":{"rendered":"https:\/\/designingmedia.com\/redlight\/?page_id=11"},"modified":"2025-06-19T14:18:17","modified_gmt":"2025-06-19T12:18:17","slug":"home","status":"publish","type":"page","link":"https:\/\/bridge.enterprises\/en\/","title":{"rendered":"Home"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2341\" class=\"elementor elementor-2341\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12c88b2 e-flex e-con-boxed e-con e-parent\" data-id=\"12c88b2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f7a561 elementor-widget__width-initial elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8f7a561\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-635eed8 elementor-widget__width-auto elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-shape-rounded elementor-grid-0 e-grid-align-center elementor-widget elementor-widget-social-icons\" data-id=\"635eed8\" data-element_type=\"widget\" data-widget_type=\"social-icons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-facebook-f elementor-repeater-item-594344b\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Facebook-f<\/span>\n\t\t\t\t\t\t<svg class=\"e-font-icon-svg e-fab-facebook-f\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M279.14 288l14.22-92.66h-88.91v-60.13c0-25.35 12.42-50.06 52.24-50.06h40.42V6.26S260.43 0 225.36 0c-73.22 0-121.08 44.38-121.08 124.72v70.62H22.89V288h81.39v224h100.17V288z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-twitter elementor-repeater-item-551c3a0\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Twitter<\/span>\n\t\t\t\t\t\t<svg class=\"e-font-icon-svg e-fab-twitter\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M459.37 151.716c.325 4.548.325 9.097.325 13.645 0 138.72-105.583 298.558-298.558 298.558-59.452 0-114.68-17.219-161.137-47.106 8.447.974 16.568 1.299 25.34 1.299 49.055 0 94.213-16.568 130.274-44.832-46.132-.975-84.792-31.188-98.112-72.772 6.498.974 12.995 1.624 19.818 1.624 9.421 0 18.843-1.3 27.614-3.573-48.081-9.747-84.143-51.98-84.143-102.985v-1.299c13.969 7.797 30.214 12.67 47.431 13.319-28.264-18.843-46.781-51.005-46.781-87.391 0-19.492 5.197-37.36 14.294-52.954 51.655 63.675 129.3 105.258 216.365 109.807-1.624-7.797-2.599-15.918-2.599-24.04 0-57.828 46.782-104.934 104.934-104.934 30.213 0 57.502 12.67 76.67 33.137 23.715-4.548 46.456-13.32 66.599-25.34-7.798 24.366-24.366 44.833-46.132 57.827 21.117-2.273 41.584-8.122 60.426-16.243-14.292 20.791-32.161 39.308-52.628 54.253z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin-in elementor-repeater-item-a3a1a15\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin-in<\/span>\n\t\t\t\t\t\t<svg class=\"e-font-icon-svg e-fab-linkedin-in\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-pinterest-p elementor-repeater-item-703ff77\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Pinterest-p<\/span>\n\t\t\t\t\t\t<svg class=\"e-font-icon-svg e-fab-pinterest-p\" viewbox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M204 6.5C101.4 6.5 0 74.9 0 185.6 0 256 39.6 296 63.6 296c9.9 0 15.6-27.6 15.6-35.4 0-9.3-23.7-29.1-23.7-67.8 0-80.4 61.2-137.4 140.4-137.4 68.1 0 118.5 38.7 118.5 109.8 0 53.1-21.3 152.7-90.3 152.7-24.9 0-46.2-18-46.2-43.8 0-37.8 26.4-74.4 26.4-113.4 0-66.2-93.9-54.2-93.9 25.8 0 16.8 2.1 35.4 9.6 50.7-13.8 59.4-42 147.9-42 209.1 0 18.9 2.7 37.5 4.5 56.4 3.4 3.8 1.7 3.4 6.9 1.5 50.4-69 48.6-82.5 71.4-172.8 12.3 23.4 44.1 36 69.3 36 106.2 0 153.9-103.5 153.9-196.8C384 71.3 298.2 6.5 204 6.5z\"><\/path><\/svg>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14a88ca elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-child\" data-id=\"14a88ca\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bad1f6f e-flex e-con-boxed e-con e-parent\" data-id=\"bad1f6f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<article class=\"elementor-element elementor-element-16c692e e-flex e-con-boxed e-con e-parent\" data-id=\"16c692e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe050f3 elementor-widget elementor-widget-heading\" data-id=\"fe050f3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Our Services<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t<div class=\"elementor-element elementor-element-b63783d e-flex e-con-boxed e-con e-parent\" data-id=\"b63783d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dde7ac6 e-grid e-con-boxed e-con e-child\" data-id=\"dde7ac6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f053800 imageInfoBox e-transform elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"f053800\" data-element_type=\"widget\" data-settings=\"{&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/en\/embedded-cybersecurity\/\" tabindex=\"-1\"><img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/12.png\" class=\"attachment-full size-full wp-image-2889\" alt=\"\" srcset=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/12.png 500w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/12-300x300.png 300w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/12-150x150.png 150w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/12-12x12.png 12w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-title\"><a href=\"\/en\/embedded-cybersecurity\/\"><span class=\"imageBoxTitle\">Embedded Cybersecurity<\/span><\/a><\/p><p class=\"elementor-image-box-description\">Cyberattacks are not any longer a hypothetical danger, they are omnipresent. Especially in places you wouldn't normally think of: \n\nEmdedded Systems.\n<br>\n<br>\n <a href=\"\/en\/embedded-cybersecurity\/\" class=\"elementor-button-link elementor-button\">Discover More<\/a>\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-064b3d9 imageInfoBox e-transform elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"064b3d9\" data-element_type=\"widget\" data-settings=\"{&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/en\/cybersecurity-compliance\/\" tabindex=\"-1\"><img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/2.png\" class=\"attachment-full size-full wp-image-2890\" alt=\"\" srcset=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/2.png 500w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/2-300x300.png 300w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/2-150x150.png 150w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/2-12x12.png 12w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-title\"><a href=\"\/en\/cybersecurity-compliance\/\"><span class=\"imageBoxTitle\">R.E.D. Art. 3.3<\/span><\/a><\/p><p class=\"elementor-image-box-description\">Learn how to make your systems R.E.D. (Radio Equipment Directive) Art 3.3 compliant.\n<br><br><br>\n\n <a href=\"\/en\/cybersecurity-compliance\/\" class=\"elementor-button-link elementor-button\">Discover More<\/a>\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c4461c imageInfoBox e-transform elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"3c4461c\" data-element_type=\"widget\" data-settings=\"{&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/en\/cybersecurity-compliance\/\" tabindex=\"-1\"><img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__2_-removebg-preview.png\" class=\"attachment-full size-full wp-image-2883\" alt=\"\" srcset=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__2_-removebg-preview.png 500w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__2_-removebg-preview-300x300.png 300w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__2_-removebg-preview-150x150.png 150w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__2_-removebg-preview-12x12.png 12w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-title\"><a href=\"\/en\/cybersecurity-compliance\/\"><span class=\"imageBoxTitle\">Cyberresilience Act<\/span><\/a><\/p><p class=\"elementor-image-box-description\">Your systems and Industry 4.0 products must comply with the EU Cyber Resilience Act beginning mid 2027.\n\n<br>\n<br>\n<br>\n <a href=\"\/en\/cybersecurity-compliance\/\" class=\"elementor-button-link elementor-button\">Discover More<\/a>\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6de75ac imageInfoBox e-transform elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"6de75ac\" data-element_type=\"widget\" data-settings=\"{&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/en\/secure-railway-solutions\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__3_-removebg-preview.png\" class=\"attachment-full size-full wp-image-2881\" alt=\"\" srcset=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__3_-removebg-preview.png 500w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__3_-removebg-preview-300x300.png 300w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__3_-removebg-preview-150x150.png 150w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__3_-removebg-preview-12x12.png 12w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-title\"><a href=\"\/en\/secure-railway-solutions\/\"><span class=\"imageBoxTitle\">Secure Railway Solutions<\/span><\/a><\/p><p class=\"elementor-image-box-description\">Everything under control: we develop secure systems for the rail industry.\n\n\n<br>\n<br>\n<br>\n <a href=\"\/en\/secure-railway-solutions\/\" class=\"elementor-button-link elementor-button\">Discover More<\/a>\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c798f6 imageInfoBox e-transform elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"6c798f6\" data-element_type=\"widget\" data-settings=\"{&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/en\/automotive-cybersecurity\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__1_-removebg-preview.png\" class=\"attachment-full size-full wp-image-2882\" alt=\"\" srcset=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__1_-removebg-preview.png 500w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__1_-removebg-preview-300x300.png 300w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__1_-removebg-preview-150x150.png 150w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__1_-removebg-preview-12x12.png 12w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-title\"><a href=\"\/en\/automotive-cybersecurity\/\"><span class=\"imageBoxTitle\">Automotive Cybersecurity<\/span><\/a><\/p><p class=\"elementor-image-box-description\">We build customized solutions for automotive cybersecurity.\n\n<br>\n<br>\n<br>\n <a href=\"\/en\/automotive-cybersecurity\/\" class=\"elementor-button-link elementor-button\">Discover More<\/a>\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79e0c0a imageInfoBox e-transform elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"79e0c0a\" data-element_type=\"widget\" data-settings=\"{&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"\/en\/digitalisierung\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__4_-removebg-preview.png\" class=\"attachment-full size-full wp-image-2884\" alt=\"\" srcset=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__4_-removebg-preview.png 500w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__4_-removebg-preview-300x300.png 300w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__4_-removebg-preview-150x150.png 150w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__4_-removebg-preview-12x12.png 12w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-title\"><a href=\"\/en\/digitalisierung\/\"><span class=\"imageBoxTitle\">Digitization<\/span><\/a><\/p><p class=\"elementor-image-box-description\">We will show you how to digitize your business processes and connect your products with them.\n\n<br>\n<br>\n <a href=\"\/en\/digitalisierung\/\" class=\"elementor-button-link elementor-button\">Discover More<\/a>\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ba3794c e-flex e-con-boxed e-con e-parent\" data-id=\"ba3794c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9858a4e e-flex e-con-boxed e-con e-child\" data-id=\"9858a4e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-53a9e09 e-flex e-con-boxed e-con e-child\" data-id=\"53a9e09\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2bc2e7f elementor-widget elementor-widget-image\" data-id=\"2bc2e7f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"509\" height=\"585\" src=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2023\/12\/cyber-security-left-img.png\" class=\"attachment-full size-full wp-image-396\" alt=\"\" srcset=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2023\/12\/cyber-security-left-img.png 509w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2023\/12\/cyber-security-left-img-261x300.png 261w\" sizes=\"(max-width: 509px) 100vw, 509px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f7de099 e-flex e-con-boxed e-con e-child\" data-id=\"f7de099\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c842eae elementor-widget elementor-widget-heading\" data-id=\"c842eae\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"> <span style=\"color:#f43334\">Embedded Security<\/span>\nExperts<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5bc30a elementor-widget elementor-widget-text-editor\" data-id=\"c5bc30a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>We are committed to develop secure embedded solutions for the automotive, production, rail and Industry 4.0 sectors and empowering existing systems state of the art cybersecurity.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68363be elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"68363be\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"\/en\/embedded-cybersecurity\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discover More<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0a02131 e-flex e-con-boxed e-con e-child\" data-id=\"0a02131\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-074e9f1 e-flex e-con-boxed e-con e-child\" data-id=\"074e9f1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef2cf0f elementor-widget elementor-widget-heading\" data-id=\"ef2cf0f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><span style=\"color:#f43334\">R.E.D. <\/span>\n\/ CRA & PSTI-Compliance  <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf77004 elementor-widget elementor-widget-text-editor\" data-id=\"cf77004\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Legislators around the world are raising product security standards for networked devices. The focus is currently on the R.E.D., EU-CRA and PSTI standards. In China, the CSL (Chinese Cybersecurity Law) is enforced.<\/p><p>We show you how to adapt existing products and develop new products compliantly.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5198cf0 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"5198cf0\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"\/en\/cybersecurity-compliance\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discover More<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-181703e e-flex e-con-boxed e-con e-child\" data-id=\"181703e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9574370 elementor-widget elementor-widget-image\" data-id=\"9574370\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"509\" height=\"585\" src=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2023\/12\/cyber-security-right-img.png\" class=\"attachment-full size-full wp-image-473\" alt=\"\" srcset=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2023\/12\/cyber-security-right-img.png 509w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2023\/12\/cyber-security-right-img-261x300.png 261w\" sizes=\"(max-width: 509px) 100vw, 509px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-759776b e-flex e-con-boxed e-con e-parent\" data-id=\"759776b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6eb62c5 e-flex e-con-boxed e-con e-child\" data-id=\"6eb62c5\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71cd42f elementor-widget elementor-widget-heading\" data-id=\"71cd42f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Why Choose Us<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2b086b1 e-grid e-con-boxed e-con e-child\" data-id=\"2b086b1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b2d201 imageInfoBox e-transform elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"8b2d201\" data-element_type=\"widget\" data-settings=\"{&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/bridge.enterprises\/en\/services\/embedded-cybersecurity\/\" tabindex=\"-1\"><img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/2.png\" class=\"attachment-full size-full wp-image-2890\" alt=\"\" srcset=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/2.png 500w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/2-300x300.png 300w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/2-150x150.png 150w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/2-12x12.png 12w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-title\"><a href=\"https:\/\/bridge.enterprises\/en\/services\/embedded-cybersecurity\/\"><span class=\"imageBoxTitle\">Security Matters<\/span><\/a><\/p><p class=\"elementor-image-box-description\">We have more than 20 years of experience securing (embedded) systems.\n\n<br>\n<br>\n<br>\n <a href=\"\/en\/ueber-uns\/\" class=\"elementor-button-link elementor-button\">Discover More<\/a>\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7ae772 imageInfoBox e-transform elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"e7ae772\" data-element_type=\"widget\" data-settings=\"{&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/bridge.enterprises\/en\/services\/embedded-cybersecurity\/\" tabindex=\"-1\"><img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__2_-removebg-preview.png\" class=\"attachment-full size-full wp-image-2883\" alt=\"\" srcset=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__2_-removebg-preview.png 500w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__2_-removebg-preview-300x300.png 300w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__2_-removebg-preview-150x150.png 150w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__2_-removebg-preview-12x12.png 12w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-title\"><a href=\"https:\/\/bridge.enterprises\/en\/services\/embedded-cybersecurity\/\"><span class=\"imageBoxTitle\">Data Protection<\/span><\/a><\/p><p class=\"elementor-image-box-description\">Our services are provided on the basis of strict data protection requirements.\n\n<br>\n<br>\n <a href=\"\/en\/ueber-uns\/\" class=\"elementor-button-link elementor-button\">Discover More<\/a>\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08dd12a imageInfoBox e-transform elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"08dd12a\" data-element_type=\"widget\" data-settings=\"{&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/bridge.enterprises\/en\/services\/embedded-cybersecurity\/\" tabindex=\"-1\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__1_-removebg-preview.png\" class=\"attachment-full size-full wp-image-2882\" alt=\"\" srcset=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__1_-removebg-preview.png 500w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__1_-removebg-preview-300x300.png 300w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__1_-removebg-preview-150x150.png 150w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2024\/06\/Design_ohne_Titel__1_-removebg-preview-12x12.png 12w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-title\"><a href=\"https:\/\/bridge.enterprises\/en\/services\/embedded-cybersecurity\/\"><span class=\"imageBoxTitle\">Support from concept to certification<\/span><\/a><\/p><p class=\"elementor-image-box-description\">We accompany you through the entire development cycle right up to certification.\n<br>\n<br>\n <a href=\"\/en\/ueber-uns\/\" class=\"elementor-button-link elementor-button\">Discover More<\/a>\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3dc78af e-flex e-con-boxed e-con e-parent\" data-id=\"3dc78af\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2bacccd e-con-full e-flex e-con e-child\" data-id=\"2bacccd\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7585522 e-con-full e-flex e-con e-child\" data-id=\"7585522\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a819ca0 elementor-widget elementor-widget-image\" data-id=\"a819ca0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"509\" height=\"585\" src=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2023\/12\/accordian-left-img.png\" class=\"attachment-large size-large wp-image-1222\" alt=\"\" srcset=\"https:\/\/bridge.enterprises\/wp-content\/uploads\/2023\/12\/accordian-left-img.png 509w, https:\/\/bridge.enterprises\/wp-content\/uploads\/2023\/12\/accordian-left-img-261x300.png 261w\" sizes=\"(max-width: 509px) 100vw, 509px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a280c58 e-con-full e-flex e-con e-child\" data-id=\"a280c58\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-089934c elementor-widget elementor-widget-heading\" data-id=\"089934c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Frequently asked questions<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57bc343 faq-section elementor-widget elementor-widget-toggle\" data-id=\"57bc343\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h5 id=\"elementor-tab-title-9191\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-9191\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-angle-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What is the EU Cyberresielience Act?<\/a>\n\t\t\t\t\t<\/h5>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-9191\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-9191\"><p>With the Cyber Resilience Act, the EU is introducing new cyber security requirements for products with digital components. Background is the increasing number of network attached devices and services in both the business and private sectors.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h5 id=\"elementor-tab-title-9192\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-9192\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-angle-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What is the Radio Equipment Directive R.E.D. Art. 3.3?<\/a>\n\t\t\t\t\t<\/h5>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-9192\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-9192\"><p>This is an EU regulation for networked devices that will apply from August 2025 and is intended to minimize the vulnerability of radio equipped network attached devices with.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h5 id=\"elementor-tab-title-9193\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-9193\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-angle-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What is the PSTI Bill?<\/a>\n\t\t\t\t\t<\/h5>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-9193\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-9193\"><p>This law is intended to significantly increase the product security of network attached devices in the UK with regard to cybersecurity.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h5 id=\"elementor-tab-title-9194\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-9194\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-angle-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">What are the basics of standard-compliant cybersecurity in cars?<\/a>\n\t\t\t\t\t<\/h5>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-9194\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-9194\"><p>Eine normgerechte Cybersecurity richtet sich an der ISO 21434 und der UN ECE R 155\/156 aus.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<h5 id=\"elementor-tab-title-9195\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-9195\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><svg class=\"elementor-toggle-icon-opened e-font-icon-svg e-fas-angle-down\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M143 352.3L7 216.3c-9.4-9.4-9.4-24.6 0-33.9l22.6-22.6c9.4-9.4 24.6-9.4 33.9 0l96.4 96.4 96.4-96.4c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9l-136 136c-9.2 9.4-24.4 9.4-33.8 0z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Which standards count for secure rail solutions?<\/a>\n\t\t\t\t\t<\/h5>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-9195\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-9195\"><p>Standard-compliant products are developed on the basis of the IEC 61508 \/ EN 50128, EN 50129, TS 50701, IEC 61375, EN 50155 standards<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9c289a4 e-flex e-con-boxed e-con e-child\" data-id=\"9c289a4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0594188 e-flex e-con-boxed e-con e-child\" data-id=\"0594188\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55dc159 elementor-widget elementor-widget-heading\" data-id=\"55dc159\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><span style=\"background-color: transparent;\">Latest News<\/span><\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ab0f01 elementor-widget elementor-widget-text-editor\" data-id=\"5ab0f01\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"text-align: start; background-color: transparent;\">A global manufacturer of IoT devices and major player in the field of machine-2-machine communication uses our services around R.E.D. Art. 3.3, EN 18031 and CRA<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fac279e elementor-align-center elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"fac279e\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"http:\/\/bridge.enterprises\/en\/cybersecurity-compliance\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Discover More<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b11e597 e-flex e-con-boxed e-con e-child\" data-id=\"b11e597\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f2a0a50 e-flex e-con-boxed e-con e-child\" data-id=\"f2a0a50\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-255c98c elementor-widget elementor-widget-heading\" data-id=\"255c98c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Arrange an initial consultation now!<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdc3185 elementor-widget elementor-widget-text-editor\" data-id=\"fdc3185\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Get in touch with our experts.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93b8fe9 elementor-align-center elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"93b8fe9\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"\/en\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get in touch<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Facebook-f Twitter Linkedin-in Pinterest-p Unsere Services Embedded Cybersecurity Cyberangriffe sind keine hypothetische Gefahr, sondern allgegenw\u00e4rtig. Vor allem auch an Stellen, an die man normalerweise nicht denkt: Emdedded Systems. Mehr erfahren R.E.D. Art. 3.3 Erfahren Sie, wie Sie Ihre Systeme R.E.D. (Radio Equipment Directive) Art 3.3 compliant machen. Mehr erfahren Cyberresilience Act Ihre Systeme und Industrie [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-2341","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/bridge.enterprises\/en\/wp-json\/wp\/v2\/pages\/2341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bridge.enterprises\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bridge.enterprises\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bridge.enterprises\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bridge.enterprises\/en\/wp-json\/wp\/v2\/comments?post=2341"}],"version-history":[{"count":679,"href":"https:\/\/bridge.enterprises\/en\/wp-json\/wp\/v2\/pages\/2341\/revisions"}],"predecessor-version":[{"id":4496,"href":"https:\/\/bridge.enterprises\/en\/wp-json\/wp\/v2\/pages\/2341\/revisions\/4496"}],"wp:attachment":[{"href":"https:\/\/bridge.enterprises\/en\/wp-json\/wp\/v2\/media?parent=2341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}